0%

Book Description

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Inside are detailed chapters that:

  • Explain what is meant by cyber security and cyber security policy

  • Discuss the process by which cyber security policy goals are set

  • Educate the reader on decision-making processes related to cyber security

  • Describe a new framework and taxonomy for explaining cyber security policy issues

  • Show how the U.S. government is dealing with cyber security policy issues

  • With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

    Table of Contents

    1. Cover
    2. Title page
    3. Copyright page
    4. Foreword
    5. Preface
    6. Acknowledgments
    7. 1 Introduction
      1. 1.1 What Is Cyber Security?
      2. 1.2 What Is Cyber Security Policy?
      3. 1.3 Domains of Cyber Security Policy
      4. 1.4 Strategy versus Policy
    8. 2 Cyber Security Evolution
      1. 2.1 Productivity
      2. 2.2 Internet
      3. 2.3 e-Commerce
      4. 2.4 Countermeasures
      5. 2.5 Challenges
    9. 3 Cyber Security Objectives
      1. 3.1 Cyber Security Metrics
      2. 3.2 Security Management Goals
      3. 3.3 Counting Vulnerabilities
      4. 3.4 Security Frameworks
      5. 3.5 Security Policy Objectives
    10. 4 Guidance for Decision Makers
      1. 4.1 Tone at the Top
      2. 4.2 Policy as a Project
      3. 4.3 Cyber Security Management
      4. 4.4 Using the Catalog
    11. 5 The Catalog Approach
      1. 5.1 Catalog Format
      2. 5.2 Cyber Security Policy Taxonomy
    12. 6 Cyber Security Policy Catalog
      1. 6.1 Cyber Governance Issues
      2. 6.2 Cyber User Issues
      3. 6.3 Cyber Conflict Issues
      4. 6.4 Cyber Management Issues
      5. 6.5 Cyber Infrastructure Issues
    13. 7 One Government’s Approach to Cyber Security Policy
      1. 7.1 U.S. Federal Cyber Security Strategy
      2. 7.2 A Brief History of Cyber Security Public Policy Development in the U.S. Federal Government
      3. 7.3 The Rise of Cyber Crime
      4. 7.4 Espionage and Nation-State Actions
      5. 7.5 Policy Response to Growing Espionage Threats: U.S. Cyber Command
      6. 7.6 Congressional Action
      7. 7.7 Summary
    14. 8 Conclusion
    15. Glossary
    16. References
    17. Index
    3.138.113.188